312-50v9 exam questions and answers provided by Lead2pass will guarantee you pass 312-50v9 exam, because Lead2pass is the top IT Certification study training materials vendor. Many candidates have passed exam with the help of Lead2pass. We offer the latest 312-50v9 PDF and VCE dumps with new version VCE player for free download, you can pass the exam beyond any doubt.

QUESTION 321As an Ethical Hacker you are capturing traffic from your customer network with Wireshark and you need to find and verify just SMTP traffic. What command in Wireshark will help you to find this kind of traffic?

QUESTION 322Which service in a PKI will vouch for the identity of an individual or company?

A. KDCB. CAC. CRD. CBC

Answer: B

QUESTION 323In IPv6 what is the major difference concerning application layer vulnerabilities compared to IPv4?

A. Implementing IPv4 security in a dual-stack network offers protection from IPv6 attacks too.B. Vulnerabilities in the application layer are independent of the network layer. Attacks and mitigation techniques are almost identical.C. Due to the extensive security measures built in IPv6, application layer vulnerabilities need not be addresses.D. Vulnerabilities in the application layer are greatly different from IPv4.

Answer: B

QUESTION 324In which phase of the ethical hacking process can Google hacking be employed? This is a technique that involves manipulating a search string with specific operators to search for vulnerabilities.

QUESTION 325Which type of security feature stops vehicles from crashing through the doors of a building?

A. TurnstileB. BollardsC. MantrapD. Receptionist

Answer: B

QUESTION 326……..is an attack type for a rogue Wi-Fi access point that appears to be a legitimate one offered on the premises, but actually has been set up to eavesdrop on wireless communications. It is the wireless version of the phishing scam. An attacker fools wireless users into connecting a laptop or mobile phone to a tainted hotspot by posing as a legitimate provider. This type of attack may be used to steal the passwords of unsuspecting users by either snooping the communication link or by phishing, which involves setting up a fraudulent web site and luring people there.

QUESTION 329Your next door neighbor, that you do not get along with, is having issues with their network, so he yells to his spouse the network’s SSID and password and you hear them both clearly. What do you do with this information?

A. Nothing, but suggest to him to change the network’s SSID and password.B. Sell his SSID and password to friends that come to your house, so it doesn’t slow down your network.C. Log onto to his network, after all it’s his fault that you can get in.D. Only use his network when you have large downloads so you don’t tax your own network.

Answer: A

QUESTION 330Shellshock had the potential for an unauthorized user to gain access to a server. It affected many internet- facing services, which OS did it not directly affect?

A. WindowsB. UnixC. LinuxD. OS X

Answer: D

QUESTION 331You want to analyze packets on your wireless network. Which program would you use?

A. Wireshark with AirpcapB. Airsnort with AirpcapC. Wireshark with WinpcapD. Ethereal with Winpcap

Answer: A

QUESTION 332It has been reported to you that someone has caused an information spillage on their computer. You go to the computer, disconnect it from the network, remove the keyboard and mouse, and power it down. What step in incident handling did you just complete?

QUESTION 334An enterprise recently moved to a new office and the new neighborhood is a little risky. The CEO wants to monitor the physical perimeter and the entrance doors 24 hours. What is the best option to do this job?

A. Use fences in the entrance doors.B. Install a CCTV with cameras pointing to the entrance doors and the street.C. Use an IDS in the entrance doors and install some of them near the corners.D. Use lights in all the entrance doors and along the company’s perimeter.

Answer: B

QUESTION 335Which of the following is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.

QUESTION 338One of the Forbes 500 companies has been subjected to a large scale attack. You are one of the shortlisted pen testers that they may hire. During the interview with the CIO, he emphasized that he wants to totally eliminate all risks. What is one of the first things you should do when hired?

A. Interview all employees in the company to rule out possible insider threats.B. Establish attribution to suspected attackers.C. Explain to the CIO that you cannot eliminate all risk, but you will be able to reduce risk to acceptable levels.D. Start the Wireshark application to start sniffing network traffic.

Answer: C

QUESTION 339Which of the following is an NMAP script that could help detect HTTP Methods such as GET, POST, HEAD, PUT, DELETE, TRACE?

A. http-gitB. http-headersC. http enumD. http-methods

Answer: D

QUESTION 340Which of the following is the most important phase of ethical hacking wherein you need to spend considerable amount of time?

Lead2pass is the leader in supplying candidates with current and up-to-date training materials for EC-Council certification and exam preparation. Comparing with others, our 312-50v9 exam questions are more authoritative and complete. We offer the latest 312-50v9 PDF and VCE dumps with new version VCE player for free download, and the new 312-50v9 dump ensures your exam 100% pass.